1,515 research outputs found
Recommended from our members
Combining 3D and 2D for less constrained periocular recognition
Periocular recognition has recently become an active
topic in biometrics. Typically it uses 2D image data of
the periocular region. This paper is the first description of combining 3D shape structure with 2D texture. A simple and effective technique using iterative closest point (ICP) was applied for 3D periocular region matching. It proved its strength for relatively unconstrained eye region capture, and does not require any training. Local binary patterns (LBP) were applied for 2D image based periocular matching. The two modalities were combined at the score-level. This approach was evaluated using the Bosphorus 3D face database, which contains large variations in facial expressions, head poses and occlusions. The rank-1 accuracy achieved from the 3D data (80%) was better than that for 2D (58%), and the best accuracy (83%) was achieved by fusing the two types of data. This suggests that significant improvements to periocular recognition systems could be achieved using the 3D structure information that is now available from small and inexpensive sensors
Bringing Theoretical and Comparative Studies Together
The debate whether power is a kind of resource or an application of resources
shows the complexities of the concept of power. By combining both
perspectives, the authors argue that it is possible to develop a new
categorization of power: soft power, soft hard-power, hard soft-power and hard
power. Compared with the US and the European Union, the authors argue that if
the American power strategy could be seen as “omnidirectional American
primacy” and EU “omnidirectional post-sovereignty”, China’s power strategy at
the moment could be mainly described as an “attraction-defence” one. With
relatively limited tangible and intangible power resources, China relies more
on attraction than coercion, and focuses more on defence rather than shaping.
Finally, the authors propose to improve China’s power strategy by prioritizing
its soft economic hard-power, upgrading soft power, extending soft military
hard-power, moderately developing hard power and hard soft-power, and
expanding its shaping function while maintaining the central defensive role
Recommended from our members
Biometrics in ABC: counter-spoofing research
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The
FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on
board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for
counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types
of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to
biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks
- …